i am not helping em. by exploring their weaknesses companies can devise better solutions against computer theft.
ur censorship will only encourage curiosity, why not give them the infomation?
I thought u were smarter about this
Printable View
i am not helping em. by exploring their weaknesses companies can devise better solutions against computer theft.
ur censorship will only encourage curiosity, why not give them the infomation?
I thought u were smarter about this
Please. <_<Quote:
Originally posted by james_bond_rulez@12 January 2004 - 11:39
I thought u were smarter about this
As I said. This board is not for that.
alright i'll stop :lol:
why am i compromise security? everybody knows to at least format the drive or ghost the drive b4 u do
it's really common knowledge, hardly compromising anything.
If you dont want to get ur laptop stolen just use common sense. dont let it out of ur sights and use hardware antitheft devices like those cables and enclosures to secure ur laptop.
Okay, now THAT would be crossing my Line of accpectability if I were a moderator.Quote:
Originally posted by james_bond_rulez@12 January 2004 - 13:10
alright i'll stop :lol:
why am i compromise security? everybody knows to at least format the drive or ghost the drive b4 u do
.
Anyway, the GPS thing, would work, and I could see companies tracking by that. And yes, GPS devices are that small now. My friend has a handy USB one for his laptop that is about the size of half a twinkie.
So what makes you guys think they don't exist already?
really that kinda sounds kool, but if it was in the USB port then wouldnt the theif just pull it out or something?Quote:
Originally posted by _John_Lennon_@12 January 2004 - 18:51
My friend has a handy USB one for his laptop that is about the size of half a twinkie.
even if u can track by gps did u ever think about the issue of transmitting the signals?
a gps RECEIVER only receives the signals coming from the sat not transmitting them out. it could be designed so that if a stolen laptop with gps tracking when connected to internet it would send the coordinate of the laptop to whatever
even that isn't reliable
even if you had a radio transmitter i doubt the batt would last that long
anybody has some other inventive theories?
oh and, i didn't read all this from articles or what not i only read about the software solutions from the websites, which is widely available to the public. so to censor this kind of trivial information on the board is really not advised since there is no rulez regarding censorship.
and this is by no means a how to guide on how to steal laptops. Virtual u have a lot to learn about modding a forum.
This is a discussion about technology and i dont think u should limit the discussion in anyway.
I think you are wrong there, james_bond_rulez. I'm quite sure this falls under the topic of hacking.Quote:
6. Posts that contain direct download links to copyrighted software, private ftp sites, serial numbers, warez sites, and hacking sites are prohibited. Posts directly or indirectly related to any of this information will be edited. Hacking discussions are strictly prohibited within the forum. Sig2dat quicklinks and hashes are NOT considered to be DDL, therefore allowed.
And I have not censored anything here. If I would have then your posts would have been edited.
Don't keep pushing this issue, james_bond_rulez.
I have no problem with discussions about the technology but as soon as you cross the line to show how the bypass it then it's hacking discussion (not permitted).
so if i do a format on my harddrive i am hacking my computer? haha give me a break
I didn't say that.
Where did you get that idea?
And what happened about your statement:
Quote:
alright i'll stop :lol:
k if everybody is like u, thinking software tracking is sooooo safe and efficient and accurate then it's BETTER just hand the thief ur laptop!!!!
the thing is ppl think it's good but in fact it's not. it gives ppl the false security when in fact it can be so easily countered.
to ignore that fact will be truely ignorant.
You are putting words into my mouth. I never said anything about how efficient the systems are. I said they exist.
I will not get into a debate about this. I have asked you to not post about bypassing them. That's all.
Intersesting you are telling others not to talk about a suject you brought into this post...Quote:
Originally posted by Virtualbody1234@10 January 2004 - 09:50
If it's stolen, it might have a device that could 'phone home' as soon as you connect to the internet.
@Whoever pinging a MAC??
Please that news to me.
@GPS useage
Lets be serious this is just not cost effective yet to my knowledge, the stuff I have worked with involving GPS was rather pricey to be shoving in laptops for preventing theft, though it is possible.
Most companys that offer this HYPED security will be the ones that JBR speaks of, a bullshit sense of security, typical. Though as mentioned there are many dumb theives.
@Vitual
You really need to relax I see nothing offensive in this post and I think if you really had you would have already done something or reported it, thus the request to drop it. Lets not forget what this board is about and what kind of moderation it is about. I do like the tone here and it is starting to look like other boards that can be quite annoying...
I am relaxed. I have not censored or edited things here.Quote:
Originally posted by REALITY@13 January 2004 - 01:11
@Vitual
You really need to relax I see nothing offensive in this post and I think if you really had you would have already done something or reported it, thus the request to drop it. Lets not forget what this board is about and what kind of moderation it is about. I do like the tone here and it is starting to look like other boards that can be quite annoying...
I'm just asking that the discussion doesn't go too far into bypassing these security features. I'm not even saying that it has reached that yet.
I have tried my best to say that but I feel that I'm misunderstood about it.
I think that trying to say anything about rules or avoiding problems just seems to rub some members the wrong way. And they lash out at me with the smallest comment I make.
My intention is to keep things running as smoothly as possible.
smooth...very smooth... :lol:
If you guys want to talk to hackers (not to mention get ddl links for everything you can dream of), go register and join shareordie.com. It is one of the hottest forums out there. :)
Edit: you can't see all of the forums unless you register.
Man, as long as you get flashget, you can download everything direct. Who needs kazaa? Not me? DDL rulez!
I said MAC Adress. I'm not talking about a Macintosh computer.Quote:
Originally posted by REALITY@13 January 2004 - 00:11
@Whoever pinging a MAC??
Please that news to me.
For you to understand better, this comes from Webopedia:
Actually, XBOX's have a unique MAC Address for when they have XBOX Live service enabled.Quote:
Short for Media Access Control address, a hardware address that uniquely identifies each node of a network. In IEEE 802 networks, the Data Link Control (DLC) layer of the OSI Reference Model is divided into two sublayers: the Logical Link Control (LLC) layer and the Media Access Control (MAC) layer. The MAC layer interfaces directly with the network media. Consequently, each different type of network media requires a different MAC layer.
On networks that do not conform to the IEEE 802 standards but do conform to the OSI Reference Model, the node address is called the Data Link Control (DLC) address.
I am well aware of what a MAC is thank you, nor was I referring to a Macintosh, I am still unclear as to HOW you would ping it from outside, please explain and pay attention. The MAC could however identify the original owner of the computer if recovered, also if I am not mistaken cannot be changed in a computer though it can be changed or spoofed in an XBOX and or other devices such as routers. It seems the only way to trace the unit is it would have broadcast from within. Though if I am mistaken PLEASE explain...Quote:
Originally posted by DWk@13 January 2004 - 05:25
I said MAC Adress. I'm not talking about a Macintosh computer.